Skip to navigation

Enhancement Advisory openssh enhancement update

Advisory: RHEA-2010:0683-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2010-09-08
Last updated on: 2010-09-08
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated openssh packages that add an enhancement are now available.

OpenSSH is OpenBSD's SSH (Secure Shell) protocol implementation. These packages
include the core files necessary for both the OpenSSH client and server.

These updated packages add the following enhancement:

* The OpenSSL dynamic engine loading support has been added, so that the ibmca
engine can now use Central Processor Assist for Cryptographic Function (CPACF).
(BZ#629509)

All OpenSSH users are advised to upgrade to these updated packages, which add
this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
openssh-4.3p2-41.el5_5.1.src.rpm
File outdated by:  RHBA-2012:0237
    MD5: 0b4756b25ddc8ff04e9b3533a0c65830
SHA-256: 861de3154c387a024034827d2b5d3fde9f9e3422ab9e2c5c6787bd4135037edd
 
IA-32:
openssh-4.3p2-41.el5_5.1.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 087a0f362251f33fa6b4854d5476005a
SHA-256: c058a4717c3d2284337980c0b95318572d9bd0ffe4c4bfa2c0334b15bad484c3
openssh-askpass-4.3p2-41.el5_5.1.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 54c373bb2061aa06ce5e94a019ef01a8
SHA-256: 1455aa1f5a694ba3105d52ecb33395318837525bcd34527f24e9b5f56a34a2a4
openssh-clients-4.3p2-41.el5_5.1.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 1593870e16addb6a0a203cec6cdde87b
SHA-256: 8d504084aa83914ef63b2d61df6398b4d932a5e4010336e642b64440d8ab8293
openssh-server-4.3p2-41.el5_5.1.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 2883e5fd9ef6621eccdec859aedd97d8
SHA-256: a8612b9ee5015a673db6ca1e9ffb0f7af4b8a6919606036dbc589a45282820a3
 
IA-64:
openssh-4.3p2-41.el5_5.1.ia64.rpm
File outdated by:  RHBA-2012:0237
    MD5: a81a2ddde27ec0666ebf81b30222855e
SHA-256: 208b204dd9ea3c062585ab547ecdf5a3fac958f875fc803cdbfc9efe2e21e794
openssh-askpass-4.3p2-41.el5_5.1.ia64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 724e283eec20c2daf2fe80a6314dfcdc
SHA-256: d2f77766849142e7333906a86f5e5e646da9f2c35686822c967428f97fca8bc3
openssh-clients-4.3p2-41.el5_5.1.ia64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 94969256fbf3a64274ea45f8bb3293af
SHA-256: 098958ee60aa6d0830ca584f98d1bd6a3780b0dcf331eea006531201e788b08c
openssh-server-4.3p2-41.el5_5.1.ia64.rpm
File outdated by:  RHBA-2012:0237
    MD5: c95b0f171110951dfd4ff2f15e654107
SHA-256: 712b49edecdcca0f81cdd4dab256aa88503ac7c270d2e6caac4e89e3dd3b17af
 
PPC:
openssh-4.3p2-41.el5_5.1.ppc.rpm
File outdated by:  RHBA-2012:0237
    MD5: 0045c092478f25e99bd989137cfb1615
SHA-256: 044ed484881c7dfb3d024ec6636b8b598f742e47affbaefb6094b9211d284caf
openssh-askpass-4.3p2-41.el5_5.1.ppc.rpm
File outdated by:  RHBA-2012:0237
    MD5: 3ca6804b33d1d23b98ae02b3c28fdd39
SHA-256: 8ac35fea9bfaa8748f3d842228ab879eed25f805c79213e74ae7f4ee66f301d6
openssh-clients-4.3p2-41.el5_5.1.ppc.rpm
File outdated by:  RHBA-2012:0237
    MD5: 085b195a24167bf5eb3c48f32e5fc19f
SHA-256: 202207116c485506c44e39e78f496d58cea7f277ec7bcc3414519059f68d0c5b
openssh-server-4.3p2-41.el5_5.1.ppc.rpm
File outdated by:  RHBA-2012:0237
    MD5: 6c2e0192adf804932d517b00d7de0ff4
SHA-256: df9e5f53dc2442eb99a300bf1b445f9fa13973f1ba7178535b8394ddc666c06b
 
s390x:
openssh-4.3p2-41.el5_5.1.s390x.rpm
File outdated by:  RHBA-2012:0237
    MD5: 88640c22ddbf439746a0a36755470b48
SHA-256: 8e83953080e505b2c5143da10b3ea6fa104808e8b7561f40afdedb4c13deeeae
openssh-askpass-4.3p2-41.el5_5.1.s390x.rpm
File outdated by:  RHBA-2012:0237
    MD5: 747374e75218ad080c9507eb2d53e781
SHA-256: d3fde6dfdb54c57935e49828b584c10b8859112341d3d122b324d1c9bf411599
openssh-clients-4.3p2-41.el5_5.1.s390x.rpm
File outdated by:  RHBA-2012:0237
    MD5: 2247a0e7437cd9cffcb964609b0b5f61
SHA-256: c25e9a822dad9223fd18effd4dabf38011af31c7dd554f38a262760e0856599e
openssh-server-4.3p2-41.el5_5.1.s390x.rpm
File outdated by:  RHBA-2012:0237
    MD5: 8fff48314f9dd69f1caa3dabe1666b9a
SHA-256: 23cca276ef9d218926ba78d3602a792761719322fd459e69a55cbb80a3488e50
 
x86_64:
openssh-4.3p2-41.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 359e717fa6aa15951208558b7fb4cb60
SHA-256: 3818cf00c000cae8427ea482a3563312fefe1e8999719bf82995793929a1d0b1
openssh-askpass-4.3p2-41.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: a67aac9d54d555818b1824d8035f9ad7
SHA-256: 4c6870ef6910cdfc3708159679c05e4511ebc7b300bdf1fa5b6ceac77c7d136d
openssh-clients-4.3p2-41.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 14435ae349ca09e4bba5d534e441c1dc
SHA-256: d804c7dab014d830e780488b7e3d0bbd3eb139856fa567c0e5582e6ce29f9082
openssh-server-4.3p2-41.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 5bd15d37d295d1954429390ef6e84187
SHA-256: eb65f8921f4577bb958244afbac9c0265417baba3de71449008dff4047f800c4
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
openssh-4.3p2-41.el5_5.1.src.rpm
File outdated by:  RHBA-2012:0237
    MD5: 0b4756b25ddc8ff04e9b3533a0c65830
SHA-256: 861de3154c387a024034827d2b5d3fde9f9e3422ab9e2c5c6787bd4135037edd
 
IA-32:
openssh-4.3p2-41.el5_5.1.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 087a0f362251f33fa6b4854d5476005a
SHA-256: c058a4717c3d2284337980c0b95318572d9bd0ffe4c4bfa2c0334b15bad484c3
openssh-askpass-4.3p2-41.el5_5.1.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 54c373bb2061aa06ce5e94a019ef01a8
SHA-256: 1455aa1f5a694ba3105d52ecb33395318837525bcd34527f24e9b5f56a34a2a4
openssh-clients-4.3p2-41.el5_5.1.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 1593870e16addb6a0a203cec6cdde87b
SHA-256: 8d504084aa83914ef63b2d61df6398b4d932a5e4010336e642b64440d8ab8293
openssh-server-4.3p2-41.el5_5.1.i386.rpm
File outdated by:  RHBA-2012:0237
    MD5: 2883e5fd9ef6621eccdec859aedd97d8
SHA-256: a8612b9ee5015a673db6ca1e9ffb0f7af4b8a6919606036dbc589a45282820a3
 
x86_64:
openssh-4.3p2-41.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 359e717fa6aa15951208558b7fb4cb60
SHA-256: 3818cf00c000cae8427ea482a3563312fefe1e8999719bf82995793929a1d0b1
openssh-askpass-4.3p2-41.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: a67aac9d54d555818b1824d8035f9ad7
SHA-256: 4c6870ef6910cdfc3708159679c05e4511ebc7b300bdf1fa5b6ceac77c7d136d
openssh-clients-4.3p2-41.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 14435ae349ca09e4bba5d534e441c1dc
SHA-256: d804c7dab014d830e780488b7e3d0bbd3eb139856fa567c0e5582e6ce29f9082
openssh-server-4.3p2-41.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2012:0237
    MD5: 5bd15d37d295d1954429390ef6e84187
SHA-256: eb65f8921f4577bb958244afbac9c0265417baba3de71449008dff4047f800c4
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

629509 - Enable OpenSSH to use CPACF via OpenSSL engine ibmca in RHEL 5.5 (performance)


Keywords

engine, openssl


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/